Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-9F94-5G5W-GF6R
Vulnerability from github – Published: 2026-03-20 20:35 – Updated: 2026-03-20 20:35Summary
AWS-LC is an open-source, general-purpose cryptographic library.
Impact
A logic error in CRL distribution point matching in AWS-LC allows a revoked certificate to bypass revocation checks during certificate validation, when the application enables CRL checking and uses partitioned CRLs with Issuing Distribution Point (IDP) extensions.
Customers of AWS services do not need to take action. aws-lc-sys and aws-lc-fips-sys contain code from AWS-LC. Applications using aws-lc-sys or aws-lc-fips-sys should upgrade to the most recent releases of aws-lc-sys or aws-lc-fips-sys.
Impacted versions:
- aws-lc-sys >= v0.15.0, < v0.39.0
- aws-lc-fips-sys >= v0.13.0, < v0.13.13
Patches
The patch is included in aws-lc-sys v0.39.0 and aws-lc-fips-sys v0.13.13.
Workarounds
Applications can workaround this issue if they do not enable CRL checking (X509_V_FLAG_CRL_CHECK). Applications using complete (non-partitioned) CRLs without IDP extensions are also not affected.
Otherwise, there is no workaround and applications using aws-lc-sys or aws-lc-fips-sys should upgrade to the most recent releases of aws-lc-sys or aws-lc-fips-sys.
References
If you have any questions or comments about this advisory, we ask that you contact AWS Security via our vulnerability reporting page or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "aws-lc-fips-sys"
},
"ranges": [
{
"events": [
{
"introduced": "0.13.0"
},
{
"fixed": "0.13.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "crates.io",
"name": "aws-lc-sys"
},
"ranges": [
{
"events": [
{
"introduced": "0.15.0"
},
{
"fixed": "0.39.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-295"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-20T20:35:14Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "### Summary\n\nAWS-LC is an open-source, general-purpose cryptographic library.\n\n### Impact \n\nA logic error in CRL distribution point matching in AWS-LC allows a revoked certificate to bypass revocation checks during certificate validation, when the application enables CRL checking and uses partitioned CRLs with Issuing Distribution Point (IDP) extensions.\n\nCustomers of AWS services do not need to take action. aws-lc-sys and aws-lc-fips-sys contain code from AWS-LC. Applications using aws-lc-sys or aws-lc-fips-sys should upgrade to the most recent releases of aws-lc-sys or aws-lc-fips-sys.\n\n### Impacted versions:\n* aws-lc-sys \u003e= v0.15.0, \u003c v0.39.0\n* aws-lc-fips-sys \u003e= v0.13.0, \u003c v0.13.13\n\n### Patches \n\nThe patch is included in aws-lc-sys v0.39.0 and aws-lc-fips-sys v0.13.13.\n\n### Workarounds\n\nApplications can workaround this issue if they do not enable CRL checking (X509_V_FLAG_CRL_CHECK). Applications using complete (non-partitioned) CRLs without IDP extensions are also not affected.\n\nOtherwise, there is no workaround and applications using aws-lc-sys or aws-lc-fips-sys should upgrade to the most recent releases of aws-lc-sys or aws-lc-fips-sys.\n\n### References\n\nIf you have any questions or comments about this advisory, we ask that you contact AWS Security via our [vulnerability reporting page](https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.",
"id": "GHSA-9f94-5g5w-gf6r",
"modified": "2026-03-20T20:35:14Z",
"published": "2026-03-20T20:35:14Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/aws/aws-lc-rs/security/advisories/GHSA-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://aws.amazon.com/security/security-bulletins/2026-010-AWS"
},
{
"type": "PACKAGE",
"url": "https://github.com/aws/aws-lc-rs"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0042.html"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0048.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "CRL Distribution Point Scope Check Logic Error in AWS-LC"
}
cleanstart-2026-ej96468
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.5-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EJ96468",
"modified": "2026-03-25T05:09:00Z",
"published": "2026-04-01T09:22:08.656529Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EJ96468.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pwjx-qhcg-rvj4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1, 1.28.5-r0",
"upstream": [
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-pwjx-qhcg-rvj4",
"ghsa-r6v5-fh4h-64xc",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-ev91316
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.6-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-EV91316",
"modified": "2026-03-25T04:58:46Z",
"published": "2026-04-01T09:22:33.462978Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-EV91316.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-hh87643
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.8-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-HH87643",
"modified": "2026-03-25T04:50:32Z",
"published": "2026-04-01T09:22:32.645637Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-HH87643.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.26.8-r0, 1.26.8-r1",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-jm60128
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.4-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JM60128",
"modified": "2026-03-25T05:05:50Z",
"published": "2026-04-01T09:22:08.268986Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JM60128.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pwjx-qhcg-rvj4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0, 1.28.4-r1",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-pwjx-qhcg-rvj4",
"ghsa-r6v5-fh4h-64xc",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-kw90815
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.8-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-KW90815",
"modified": "2026-03-25T05:02:40Z",
"published": "2026-04-01T09:22:32.438088Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-KW90815.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0, 1.27.6-r1, 1.27.8-r0",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
cleanstart-2026-lk63891
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.
| URL | Type | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ztunnel-fips"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.29.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ztunnel-fips package. These issues are resolved in later releases. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-LK63891",
"modified": "2026-03-25T05:12:36Z",
"published": "2026-04-01T09:22:08.586608Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-LK63891.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2026-4428"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-2gh3-rmm4-6rq5"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-394x-vwmw-crm3"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-434x-w66g-qw3r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-65p9-r9h6-22vj"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-9f94-5g5w-gf6r"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-hfpc-8r3f-gw53"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-pwjx-qhcg-rvj4"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-r6v5-fh4h-64xc"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-rhfx-m35p-ff5j"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-vw5v-4f2q-w9xf"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/ghsa-xwfj-jgwm-7wp5"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4428"
}
],
"related": [],
"schema_version": "1.7.3",
"summary": "Security fixes for CVE-2026-4428, ghsa-2gh3-rmm4-6rq5, ghsa-394x-vwmw-crm3, ghsa-434x-w66g-qw3r, ghsa-65p9-r9h6-22vj, ghsa-9f94-5g5w-gf6r, ghsa-hfpc-8r3f-gw53, ghsa-pwjx-qhcg-rvj4, ghsa-r6v5-fh4h-64xc, ghsa-rhfx-m35p-ff5j, ghsa-vw5v-4f2q-w9xf, ghsa-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0, 1.29.1-r0",
"upstream": [
"CVE-2026-4428",
"ghsa-2gh3-rmm4-6rq5",
"ghsa-394x-vwmw-crm3",
"ghsa-434x-w66g-qw3r",
"ghsa-65p9-r9h6-22vj",
"ghsa-9f94-5g5w-gf6r",
"ghsa-hfpc-8r3f-gw53",
"ghsa-pwjx-qhcg-rvj4",
"ghsa-r6v5-fh4h-64xc",
"ghsa-rhfx-m35p-ff5j",
"ghsa-vw5v-4f2q-w9xf",
"ghsa-xwfj-jgwm-7wp5"
]
}
rustsec-2026-0042
Vulnerability from osv_rustsec
A logic error in CRL distribution point matching in AWS-LC allows a revoked certificate to bypass revocation checks during certificate validation, when the application enables CRL checking and uses partitioned CRLs with Issuing Distribution Point (IDP) extensions.
Customers of AWS services do not need to take action. aws-lc-fips-sys
contains code from AWS-LC. Applications using aws-lc-fips-sys should
upgrade to the most recent release of aws-lc-fips-sys.
Workarounds
Applications can workaround this issue if they do not enable CRL checking
(X509_V_FLAG_CRL_CHECK). Applications using complete (non-partitioned)
CRLs without IDP extensions are also not affected.
Otherwise, there is no workaround and applications using aws-lc-fips-sys
should upgrade to the most recent releases of aws-lc-fips-sys.
{
"affected": [
{
"database_specific": {
"categories": [
"crypto-failure"
],
"cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "aws-lc-fips-sys",
"purl": "pkg:cargo/aws-lc-fips-sys"
},
"ranges": [
{
"events": [
{
"introduced": "0.13.0"
},
{
"fixed": "0.13.13"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2026-4428",
"GHSA-9f94-5g5w-gf6r"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "A logic error in CRL distribution point matching in AWS-LC allows a revoked\ncertificate to bypass revocation checks during certificate validation, when\nthe application enables CRL checking and uses partitioned CRLs with Issuing\nDistribution Point (IDP) extensions.\n\nCustomers of AWS services do not need to take action. `aws-lc-fips-sys`\ncontains code from AWS-LC. Applications using `aws-lc-fips-sys` should\nupgrade to the most recent release of `aws-lc-fips-sys`.\n\n## Workarounds\n\nApplications can workaround this issue if they do not enable CRL checking\n(`X509_V_FLAG_CRL_CHECK`). Applications using complete (non-partitioned)\nCRLs without IDP extensions are also not affected.\n\nOtherwise, there is no workaround and applications using `aws-lc-fips-sys`\nshould upgrade to the most recent releases of `aws-lc-fips-sys`.",
"id": "RUSTSEC-2026-0042",
"modified": "2026-03-20T17:11:58Z",
"published": "2026-03-19T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/aws-lc-fips-sys"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0042.html"
},
{
"type": "WEB",
"url": "https://aws.amazon.com/security/security-bulletins/2026-010-AWS"
},
{
"type": "ADVISORY",
"url": "https://github.com/aws/aws-lc-rs/security/advisories/GHSA-9f94-5g5w-gf6r"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "CRL Distribution Point Scope Check Logic Error in AWS-LC"
}
rustsec-2026-0048
Vulnerability from osv_rustsec
A logic error in CRL distribution point matching in AWS-LC allows a revoked certificate to bypass revocation checks during certificate validation, when the application enables CRL checking and uses partitioned CRLs with Issuing Distribution Point (IDP) extensions.
Customers of AWS services do not need to take action. aws-lc-sys contains
code from AWS-LC. Applications using aws-lc-sys should upgrade to the most
recent release of aws-lc-sys.
Workarounds
Applications can workaround this issue if they do not enable CRL checking
(X509_V_FLAG_CRL_CHECK). Applications using complete (non-partitioned)
CRLs without IDP extensions are also not affected.
Otherwise, there is no workaround and applications using aws-lc-sys should
upgrade to the most recent releases of aws-lc-sys.
{
"affected": [
{
"database_specific": {
"categories": [
"crypto-failure"
],
"cvss": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"informational": null
},
"ecosystem_specific": {
"affected_functions": null,
"affects": {
"arch": [],
"functions": [],
"os": []
}
},
"package": {
"ecosystem": "crates.io",
"name": "aws-lc-sys",
"purl": "pkg:cargo/aws-lc-sys"
},
"ranges": [
{
"events": [
{
"introduced": "0.15.0"
},
{
"fixed": "0.39.0"
}
],
"type": "SEMVER"
}
],
"versions": []
}
],
"aliases": [
"CVE-2026-4428",
"GHSA-9f94-5g5w-gf6r"
],
"database_specific": {
"license": "CC0-1.0"
},
"details": "A logic error in CRL distribution point matching in AWS-LC allows a revoked\ncertificate to bypass revocation checks during certificate validation, when\nthe application enables CRL checking and uses partitioned CRLs with Issuing\nDistribution Point (IDP) extensions.\n\nCustomers of AWS services do not need to take action. `aws-lc-sys` contains\ncode from AWS-LC. Applications using `aws-lc-sys` should upgrade to the most\nrecent release of `aws-lc-sys`.\n\n## Workarounds\n\nApplications can workaround this issue if they do not enable CRL checking\n(`X509_V_FLAG_CRL_CHECK`). Applications using complete (non-partitioned)\nCRLs without IDP extensions are also not affected.\n\nOtherwise, there is no workaround and applications using `aws-lc-sys` should\nupgrade to the most recent releases of `aws-lc-sys`.",
"id": "RUSTSEC-2026-0048",
"modified": "2026-03-20T17:11:58Z",
"published": "2026-03-19T12:00:00Z",
"references": [
{
"type": "PACKAGE",
"url": "https://crates.io/crates/aws-lc-sys"
},
{
"type": "ADVISORY",
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0048.html"
},
{
"type": "WEB",
"url": "https://aws.amazon.com/security/security-bulletins/2026-010-AWS"
},
{
"type": "ADVISORY",
"url": "https://github.com/aws/aws-lc-rs/security/advisories/GHSA-9f94-5g5w-gf6r"
}
],
"related": [],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "CRL Distribution Point Scope Check Logic Error in AWS-LC"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.